Search for "24" returned 4475 results

G10, BND-Gesetz und der effektive Schutz vor Grundrechten
58 min

G10, BND-Gesetz und der effektive Schutz vor Grundrechten

Die strategische Fernmeldeüberwachung des BND vor dem…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

BGP and the Rule of Custom
31 min

BGP and the Rule of Custom

How the internet self-governs without international law

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

Beeinflussung durch Künstliche Intelligenz
61 min

Beeinflussung durch Künstliche Intelligenz

Über die Banalität der Beeinflussung und das Leben mit…

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.